E-Book, Englisch, Band 316, 212 Seiten, eBook
A. M. El-Bendary Developing Security Tools of WSN and WBAN Networks Applications
2015
ISBN: 978-4-431-55069-3
Verlag: Springer Tokyo
Format: PDF
Kopierschutz: 1 - PDF Watermark
E-Book, Englisch, Band 316, 212 Seiten, eBook
Reihe: Lecture Notes in Electrical Engineering
ISBN: 978-4-431-55069-3
Verlag: Springer Tokyo
Format: PDF
Kopierschutz: 1 - PDF Watermark
This book focuses on two of the most rapidly developing areas in wireless technology (WT) applications, namely, wireless sensors networks (WSNs) and wireless body area networks (WBANs). These networks can be considered smart applications of the recent WT revolutions. The book presents various security tools and scenarios for the proposed enhanced-security of WSNs, which are supplemented with numerous computer simulations. In the computer simulation section, WSN modeling is addressed using MATLAB programming language.
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Introduction.- Wireless Network Overview.- Sensing Networks.- WSN Overview.- WBAN Overview.- WSN and Embedding System Relation.- Wireless Sensing Networks Contents.- .Wireless, Mobile, and Ad-hoc Networks.- .Book Organizing.- . SENSING AND ENVIRONMENT CONCEPTS.- Introduction.- Sensing Definition.- Environment Concepts.- WSN and Environment.- Environment and Medical Care Concerns.- WSNs and Sensors.- Sensing Examples.- WIRELESS NETWORKS.- Introduction.- Low-Rate Wireless Networks.- Bluetooth Networks Architecture.- Adaptive packets of WPAN technology.- THROUGHPUT STUDY OF LOW-RATE COMMUNICATIONS.- Introduction.- Related Work.- Throughput Definition of WSN and WBAN.- Analysis of PEP.- The Proposed Scenarios.- Simulation Assumptions.- Simulation Results.- Chapter Recommendation.- WSN SECURITY NEEDS.- Introduction.- Security goals.- Fundamentals of Network Security.- Challenges of WSN Security.- WSN Implementation Technologies.- Summary.- LOWER COMPLEXITY OF SECURED WSN NETWORKS.- Power with FEC.- Complexity FEC dependant.- Interleaving Techniques.- Interleavers Investigation.- Chaotic Interleaver Structure.- Cryptography using Chaos.- Objective quality Metrics.- Jakes Method.- Mobility Effects.- Cooperative Algorithm of WSN.- Appendixes.




